WO2006006533A1 - Systeme d’identification personnelle, procede d’identification personnelle, programme d’identification personnelle et support d’enregistrement - Google Patents
Systeme d’identification personnelle, procede d’identification personnelle, programme d’identification personnelle et support d’enregistrement Download PDFInfo
- Publication number
- WO2006006533A1 WO2006006533A1 PCT/JP2005/012676 JP2005012676W WO2006006533A1 WO 2006006533 A1 WO2006006533 A1 WO 2006006533A1 JP 2005012676 W JP2005012676 W JP 2005012676W WO 2006006533 A1 WO2006006533 A1 WO 2006006533A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- personal
- sensor
- individual
- personal identification
- personal authentication
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/70—Multimodal biometrics, e.g. combining information from different biometric modalities
Definitions
- the present invention relates to a personal authentication method, and particularly to a personal authentication system, a personal authentication method, a personal authentication program, and a recording medium that authenticate an individual by integrating a plurality of pieces of information obtained at low cost. .
- Patent Document 1 Japanese Patent Laid-Open No. 08-16788
- Patent Document 1 the user must be aware of the authentication operation such as bringing his face close to the camera or placing his finger on the sensor. There is a problem that the operation is both cumbersome and also has a great psychological influence such as making the user feel uneasy!
- the conventional authentication method is vulnerable to environmental changes during authentication. For example, if the illumination, its brightness, angle, etc. change, the accuracy of face authentication will decrease drastically, and fingerprint authentication may not be possible if your finger is injured.
- the present invention provides a personal authentication system, a personal authentication method, a personal authentication program, and a recording medium capable of executing personal authentication using information obtained at low cost without making the user aware of it.
- the purpose is to provide.
- a personal authentication system includes a personal feature extraction sensor for extracting a personal feature to be authenticated, an environmental information sensor for detecting the personal environmental information, and the personal Personal authentication means for authenticating the individual based on the characteristics and the environmental information.
- the personal feature extraction sensor authenticates the individual based on the personal feature extracted from the individual to be authenticated, and the environmental information sensor detects the environmental information detected from the individual. It is possible to perform personal authentication by integrating multiple personal characteristics and environmental information, which are information that can be obtained at low cost.
- FIG. 1 is a block diagram showing a configuration of a personal authentication device according to an embodiment of the present invention.
- FIG.2 A diagram showing an example of a personal identification rule configured by a Bayesian network
- FIG.3 Diagram showing a specific example of personal authentication using a personal identification rule configured by Bayesian network
- FIG. 1 is a block diagram showing a configuration of a personal authentication system 100 according to an embodiment of the present invention.
- the personal authentication system 100 includes a personal authentication device 10, a plurality of personal feature extraction sensors 20-1 to 20-n (n is a natural number), and a plurality of environmental information sensors 30-1 to 30.
- M m is a natural number
- clock 40 clock 40
- Internet 50 multiple tracking sensors 60—1 to 60—k (k is a natural number)
- high-precision personal identification device 70 and personal schedule 80.
- the personal authentication device 10 includes a personal authentication unit 11, a candidate narrowing unit 12, a personal identification rule 13, and a personal identification rule update unit 14.
- the personal authentication means 11 includes personal feature information from a plurality of personal feature extraction sensors 20-l to 20-n, a plurality of environmental information sensors 30-l to 30-m, a clock 40, and the Internet 50. And the personal identification according to the personal identification rule 13 shown in Figure 2 below. I testify.
- Candidate narrowing means 12 includes sensor outputs from a plurality of tracking sensors 60-l-60-k and authentication information from high-precision personal authentication device 70 (for example, an ID card, a password, a face image). , Fingerprint, iris) and candidates to be authenticated based on personal schedule 80.
- the candidate narrowing means 12 may be omitted when the number of candidates to be authenticated is not necessarily required for the system, for example, when the candidate to be authenticated is a family or the like.
- the authentication information from the high-accuracy personal authentication device 70 can be used, and if there are many candidates to be authenticated, it is effective because the candidates to be authenticated can be narrowed down.
- the personal identification rule 13 is stored in advance in a database (not shown), and is used by the personal authentication means 11 for authentication.
- the personal identification rule update means 14 Since the personal identification rule update means 14 has begun to use this device, it is possible to correctly authenticate the user power when the authentication accuracy of the personal authentication device 10 is poor or when personal authentication is difficult. The result of failure is fed back by voice or the like, and the personal identification rule 13 used by the personal authentication means 11 is updated.
- This personal identification rule updating means 14 may also be omitted if the personal identification rule 13 which is not necessarily required for this system can be designed with high initial authentication accuracy. However, if it is difficult to authenticate the individual, such as when individual characteristics change, the parameters of the personal identification rule 13 are changed so that the authentication accuracy is improved while authenticating according to the personal identification rule 13, and personal identification is performed. This is effective because it can improve the authentication accuracy of Rule 13.
- the plurality of personal feature extraction sensors 20-1 to 20-n are used to collect the user's personal feature information such as the individual's position, height, weight, sitting height, face width, shoulder height, odor, and clothing color. Obtain and output to personal authentication means 11. Further, the plurality of environmental information sensors 30-1 to 30-m acquire environmental information such as temperature, humidity, atmospheric pressure, sunshine, solar radiation, wind, rain, snow, and the like, and output them to the personal authentication means 11. The clock 40 measures the time and outputs it to the personal authentication means 11. In addition, the Internet 50 acquires weather information and other Web page information and outputs them to the personal authentication means 11.
- the user is authenticated by the high-precision authentication device 70 using an ID card, a password, a face image, a fingerprint, and an iris and enters the office or the hall.
- tracking sensors 60-1 to 60-k for example, multiple infrared sensors are embedded in the ceiling of the office or in the building, or multiple pressure sensors are embedded on the floor. The movement of the user after entering the building is sensed by these tracking sensors 61-l-60-k. In addition, as the tracking sensors 60-1 to 60-k, it is also possible to grasp personal movement information using GPS (Global Positioning System).
- GPS Global Positioning System
- the personal authentication system 100 performs personal authentication by the following processing.
- the position, height, weight, sitting height, face width, shoulders of the individual are detected by a plurality of personal feature extraction sensors 20-1 to 20-n arranged near the location.
- the user's personal characteristic information such as height, smell, and clothing color is acquired and output to the personal authentication means 11.
- distance sensors provided on the ceiling, walls, pillars, etc. in offices and buildings can be used.
- a pressure sensor embedded in the floor of the office or the building.
- an individual's odor can be used.
- a color sensor can be used to detect the color of clothes.
- the information obtained from the distance sensor and the color sensor can extract the power of one or more cameras.
- environmental information such as temperature, humidity, atmospheric pressure, sunlight, solar radiation, wind, rain, snow, etc. in the office or in the hall where the environmental information sensor is located
- environmental information such as temperature, humidity, atmospheric pressure, sunlight, solar radiation, wind, rain, snow, etc. in the office or in the hall where the environmental information sensor is located
- environmental information such as temperature, humidity, atmospheric pressure, sunlight, solar radiation, wind, rain, snow, etc.
- a barometric sensor can be used to detect barometric pressure.
- a wind sensor can be used to detect wind. If it detects rain, a rain sensor can be used. If it detects snow, a snow sensor can be used.
- the clock 40 can be used for detecting the day of the week and the time.
- the Internet 50 can be used to detect weather information and other Web page information.
- the personal authentication means 11 uses the personal feature extraction sensors 20-1 to 20-n to determine the position, height, weight, sitting height, face width, shoulder height, smell, Acquire personal characteristics such as color, and acquire environmental information such as temperature, humidity, atmospheric pressure, sunlight, solar radiation, wind, rain, and snow from environmental information sensors 30-1 to 30-m, clock 40 and Internet 50.
- the personal characteristics and environment information acquired by the personal authentication means 11 of the present embodiment for performing personal authentication are an infrared sensor, a pressure sensor, an odor sensor, a personal feature extraction sensor such as an image processing result, etc. 20 — It is low-cost information that can be obtained without making the user aware of it using l-20-n. Therefore, the user does not need to perform troublesome operations or operations such as bringing his face close to the camera or inputting an ID or password for authentication.
- the high-precision personal information such as fingerprints and irises from the high-precision personal authentication device 70 is used by the candidate narrowing down means 12 to narrow down the user candidates, the personal authentication means 11 Do not use accurate information for personal authentication. In the present embodiment, it is not essential to detect all of the individual position, height, weight, sitting height, face width, shoulder height, odor, clothing color, etc. Of course, it is also possible to detect one or more pieces of information.
- the candidate narrowing means 12 includes high-precision authentication information such as fingerprints and irises from the high-precision personal authentication device 70, tracking information from the tracking sensors 60-1 to 60-k, and a database. From the personal schedule 80 stored in the service (not shown), the user candidates who receive the service at that location are narrowed down. It should be noted that the candidate narrowing down means 12 is not necessarily required to use all of the tracking information from the tracking sensors 60-l to 60-k and the personal schedule 80. Of course, you can use it in combination with the high-precision authentication information from the high-precision personal authentication device 70!
- personal authentication means 1 1 is the personal information obtained from the personal feature extraction sensors 20-l to 20-n, such as personal position, height, weight, sitting height, face width, shoulder height, odor, clothing color, and environmental information sensor 30 — 1-30—m
- It is not mandatory to use all environmental information such as temperature, humidity, weather information, day of the week, time of day, etc. obtained from the clock, clock 40 and Internet 50. It is advisable to use personal features and use any one or more environmental information to identify the individual.
- the personal authentication device 10 of the present embodiment confirmation is made to the user, for example, by voice or display.
- the user refers to the voice, display, etc. to determine whether the authentication of the personal authentication means 11 is correct, and feeds back the result by voice, key operation, etc., and inputs it to the personal identification rule update means 14 To do.
- the personal identification rule update means 14 updates the personal identification rule 13 used by the personal authentication means 11 based on the authentication result fed back by voice or key operation. As a result, even if the authentication accuracy of the personal authentication device 10 is poor or it is difficult to identify an individual because it is starting to use, the personal identification rule 13 is updated according to the user who uses this device. , It will be possible to authenticate correctly.
- FIG. 2 is a diagram illustrating an example of a personal identification rule configured by a Bayesian network.
- the personal identification rule 13 used by the personal authentication means 11 for personal authentication is constituted by a Bayesian network.
- a Bayesian network is a form of representation of the joint probability distribution of multiple variables, and it can be used to calculate the probability distribution of unknown variable values.
- variable nodes 1, Y2, ⁇ , Ym corresponding to the temperature, humidity, weather, time, etc., which are the environmental information from the environmental information sensors 30-1 to 30-m, respectively. It has a personal identification variable node Z as a child, and as a child of the personal identification variable node Z, from the personal feature extraction sensor 2 0-1 to 20-n, individual height, weight, face width, shoulder height, etc.
- This is a Bayesian network with a structure having individual characteristic information variable nodes XI, X2,.
- the Z value z that maximizes the posterior probability in S can be found by the following (Equation 2). Is possible.
- the personal authentication means 11 recognizes the user corresponding to z thus obtained as the user who is going to receive the service.
- the personal identification rule update means 14 the output when the obtained personal characteristics and environmental information are input to the personal identification rule 13 is close to the personal identification result obtained by feedback. Update identification rule 13.
- the updating method by the personal identification rule updating means 14 differs depending on what personal identification rule 13 is used. For example, in the case of Fig. 2, the probabilities P (Y), ⁇ ( ⁇ ), ...
- the estimated value of I z) will be updated. Updates to estimates are obtained through feedback.
- the inference result data can be estimated by adding to the existing data.
- the probabilities P (Y), ⁇ ( ⁇ ), ⁇ , ⁇ ( ⁇ ) are not used in (Equation 1) and (Equation 2).
- the personal characteristics and the environmental information of the past three times of the personal characteristics and the environmental information when the user ⁇ and the user ⁇ have come to the place where the personal authentication device 10 is arranged are as shown in Table 1.
- Table 2 shows the personal characteristics and environmental information of the users who came to the location. In this example, for simplification, only height and weight are used as personal characteristics, and only weather, day of the week, and time are used as environmental information.
- the user candidates receiving the service are narrowed down to user A or user B by the candidate narrowing means 12.
- This estimation is actually automatically performed based on the identification rule learned from the data in Table 1. Specifically, if the conditional probabilities of various data in Table 1 are obtained by Laplace estimation, a Bayesian network as shown in Fig. 3 is created. When a certain probability and a certain probability of B are obtained, they become 1Z4 and 3Z4, respectively, and therefore it can be estimated that the probability of being a user power is high.
- the present invention is not limited to this.
- the user power will come to the place where the personal authentication device 10 is installed or will not come, or the time required to come to the place where the personal authentication device 10 is placed will be greatly affected by the result of a sport game being broadcast on television. If it is possible to use it, it is possible to use the information on the game results that can be obtained from a specific page of the Internet as environmental information.
- the user can receive a personalized service without performing a special operation for authentication, that is, without being aware of the authentication, thereby improving user convenience. Can do.
- the candidate narrowing down means 12 uses high-precision personal authentication information such as an ID card, a personal identification number, a face image, and a fingerprint from the high-precision personal authentication device 70, and Tracking information such as infrared sensors embedded in the ceiling and pressure sensors embedded in the floor 60-l-60-k user movement detection information, and information stored in a database etc. Therefore, the personal authentication means 11 narrows down the individual candidates to be authenticated, so that the number of individual candidates to be authenticated by the personal authentication means 11 decreases, and the speed and burden of the authentication process is reduced. Can be reduced.
- high-precision personal authentication information such as an ID card, a personal identification number, a face image, and a fingerprint from the high-precision personal authentication device 70
- Tracking information such as infrared sensors embedded in the ceiling and pressure sensors embedded in the floor 60-l-60-k user movement detection information, and information stored in a database etc. Therefore, the personal authentication means 11 narrows down the individual candidates to be authenticated, so that the number of individual candidates to be authentic
- the personal authentication means 11 since the personal authentication means 11 inputs various personal characteristics and environmental information into the personal identification rule 13 by the Bayesian network, personal identification is performed. Personal authentication can be performed accurately and easily.
- the personal identification rule update means 14 feeds back the personal authentication result of the personal identification rule 13 and updates the personal identification rule 13. Even if the authentication accuracy of the personal authentication device 10 is low or it is difficult to identify an individual when using this device, it is possible to adaptively change the number of personal identification rules 13 through actual personal authentication processing. Therefore, the accuracy of personal authentication can be improved.
- the configuration of personal authentication system 100 has been described in terms of hardware by showing a block diagram, but the present invention is not limited to this.
- a CPU and a node data that stores a program for executing the CPU as described above.
- a general-purpose computer-powered personal authentication system 100 such as a PC having a storage device such as a disk memory may be executed in software.
- the personal authentication program for performing the function as the personal authentication system 100 can be recorded on a recording medium such as a CD, a flash memory, or a USB memory.
- the recording medium strength personal authentication program is read and installed in a storage device in the computer, or downloaded and stored from a server or the like via a network such as the Internet. Store in the device.
- a general-purpose computer such as a PC can execute the personal authentication described above by executing the personal authentication program that functions as the personal authentication system 100 described above.
- the personal authentication system, personal authentication method, personal authentication program, and recording medium according to the present invention can execute personal authentication using information obtained at low cost without making the user aware of it. It is useful as a personal authentication system, a personal authentication method, a personal authentication program, and a recording medium for authenticating an individual by integrating a plurality of information. It is also useful for providing personalized services to users of home appliances connected to multiple home appliances such as TVs, personal computers, refrigerators, lighting, and air conditioning.
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006529007A JPWO2006006533A1 (ja) | 2004-07-13 | 2005-07-08 | 個人認証システム、個人認証方法、個人認証用プログラムおよび記録媒体 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004206380 | 2004-07-13 | ||
JP2004-206380 | 2004-07-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006006533A1 true WO2006006533A1 (fr) | 2006-01-19 |
Family
ID=35783876
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/012676 WO2006006533A1 (fr) | 2004-07-13 | 2005-07-08 | Systeme d’identification personnelle, procede d’identification personnelle, programme d’identification personnelle et support d’enregistrement |
Country Status (2)
Country | Link |
---|---|
JP (1) | JPWO2006006533A1 (fr) |
WO (1) | WO2006006533A1 (fr) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008181253A (ja) * | 2007-01-23 | 2008-08-07 | Nippon Telegr & Teleph Corp <Ntt> | 認証装置及び認証方法並びに認証プログラム |
JP2010117971A (ja) * | 2008-11-14 | 2010-05-27 | Fujitsu Ltd | 生体認証装置、方法及びプログラム |
US8264326B2 (en) | 2006-08-31 | 2012-09-11 | Kyushu University | Biometrics sensor |
JP2017130017A (ja) * | 2016-01-20 | 2017-07-27 | ヤフー株式会社 | 情報処理装置、情報処理方法及びプログラム |
JP2018036946A (ja) * | 2016-09-01 | 2018-03-08 | 日本電信電話株式会社 | ユーザ認証システム、ユーザ認証方法およびプログラム |
JP2018045698A (ja) * | 2017-10-20 | 2018-03-22 | ヤフー株式会社 | 情報処理装置、情報処理方法及びプログラム |
JP2018156396A (ja) * | 2017-03-17 | 2018-10-04 | ヤフー株式会社 | 認証装置、認証方法、及び認証プログラム |
CN110263757A (zh) * | 2019-06-29 | 2019-09-20 | Oppo广东移动通信有限公司 | 指纹识别方法及相关产品 |
US10534901B2 (en) | 2017-07-03 | 2020-01-14 | Samsung Electronics Co., Ltd. | User authentication method and apparatus using infrared ray (IR) image |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6262177B2 (ja) * | 2015-09-03 | 2018-01-17 | 株式会社東芝 | ウェアラブル端末、方法及びシステム |
JP6279643B2 (ja) * | 2016-03-28 | 2018-02-14 | 株式会社 みずほ銀行 | ログイン管理システム、ログイン管理方法及びログイン管理プログラム |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002236665A (ja) * | 2001-02-09 | 2002-08-23 | Matsushita Electric Ind Co Ltd | 個人認証装置 |
JP2003192247A (ja) * | 2001-11-26 | 2003-07-09 | Inventio Ag | エレベータ設備での人物のセキュリティ管理および/または運搬のためのシステム及びこのシステムを運用するための方法及びこのシステムによってエレベータ設備を改良する方法 |
JP2003296770A (ja) * | 2002-04-03 | 2003-10-17 | Hitachi Ltd | 入出場管理システム |
JP2004126738A (ja) * | 2002-09-30 | 2004-04-22 | Matsushita Electric Ind Co Ltd | 3次元計測を用いた個人認証装置および認証方法 |
JP2004167227A (ja) * | 2002-11-07 | 2004-06-17 | Matsushita Electric Ind Co Ltd | 個人認証方法、虹彩登録装置、虹彩認証装置および個人認証プログラム |
-
2005
- 2005-07-08 JP JP2006529007A patent/JPWO2006006533A1/ja active Pending
- 2005-07-08 WO PCT/JP2005/012676 patent/WO2006006533A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002236665A (ja) * | 2001-02-09 | 2002-08-23 | Matsushita Electric Ind Co Ltd | 個人認証装置 |
JP2003192247A (ja) * | 2001-11-26 | 2003-07-09 | Inventio Ag | エレベータ設備での人物のセキュリティ管理および/または運搬のためのシステム及びこのシステムを運用するための方法及びこのシステムによってエレベータ設備を改良する方法 |
JP2003296770A (ja) * | 2002-04-03 | 2003-10-17 | Hitachi Ltd | 入出場管理システム |
JP2004126738A (ja) * | 2002-09-30 | 2004-04-22 | Matsushita Electric Ind Co Ltd | 3次元計測を用いた個人認証装置および認証方法 |
JP2004167227A (ja) * | 2002-11-07 | 2004-06-17 | Matsushita Electric Ind Co Ltd | 個人認証方法、虹彩登録装置、虹彩認証装置および個人認証プログラム |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8264326B2 (en) | 2006-08-31 | 2012-09-11 | Kyushu University | Biometrics sensor |
JP5187581B2 (ja) * | 2006-08-31 | 2013-04-24 | 国立大学法人九州大学 | バイオメトリクスセンサ |
JP2008181253A (ja) * | 2007-01-23 | 2008-08-07 | Nippon Telegr & Teleph Corp <Ntt> | 認証装置及び認証方法並びに認証プログラム |
JP2010117971A (ja) * | 2008-11-14 | 2010-05-27 | Fujitsu Ltd | 生体認証装置、方法及びプログラム |
JP2017130017A (ja) * | 2016-01-20 | 2017-07-27 | ヤフー株式会社 | 情報処理装置、情報処理方法及びプログラム |
JP2018036946A (ja) * | 2016-09-01 | 2018-03-08 | 日本電信電話株式会社 | ユーザ認証システム、ユーザ認証方法およびプログラム |
JP2018156396A (ja) * | 2017-03-17 | 2018-10-04 | ヤフー株式会社 | 認証装置、認証方法、及び認証プログラム |
US10534901B2 (en) | 2017-07-03 | 2020-01-14 | Samsung Electronics Co., Ltd. | User authentication method and apparatus using infrared ray (IR) image |
JP2018045698A (ja) * | 2017-10-20 | 2018-03-22 | ヤフー株式会社 | 情報処理装置、情報処理方法及びプログラム |
CN110263757A (zh) * | 2019-06-29 | 2019-09-20 | Oppo广东移动通信有限公司 | 指纹识别方法及相关产品 |
CN110263757B (zh) * | 2019-06-29 | 2021-05-04 | Oppo广东移动通信有限公司 | 指纹识别方法及相关产品 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2006006533A1 (ja) | 2008-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006006533A1 (fr) | Systeme d’identification personnelle, procede d’identification personnelle, programme d’identification personnelle et support d’enregistrement | |
JP4544363B1 (ja) | 顔認証装置、人物画像検索システム、顔認証装置制御プログラム、コンピュータ読み取り可能な記録媒体、および顔認証装置の制御方法 | |
US20200372743A1 (en) | Face based door entry | |
JP5464277B2 (ja) | 生体認証装置、生体認証プログラム及び方法 | |
US10317206B2 (en) | Location determination processing device and storage medium | |
US20190199717A1 (en) | Systems and methods for performing user recognition based on biometric information captured with wearable electronic devices | |
CN106415570B (zh) | 动态键盘和触摸屏生物标识 | |
CN107220582A (zh) | 识别车辆的驾驶员 | |
JP5286297B2 (ja) | 生体認証システム | |
US9336374B2 (en) | Method, module, and computer program product for identifying user of mobile device | |
US20210241397A1 (en) | Location-based verification of user requests and generation of notifications on mobile devices | |
CN112861082A (zh) | 用于被动认证的集成系统和方法 | |
JP2010108074A (ja) | 生体認証システム及び方法 | |
CN113096272B (zh) | 门锁控制方法、智能门锁及计算机可读存储介质 | |
WO2019077013A1 (fr) | Procédés et systèmes de traitement de signaux audio contenant des données vocales | |
JP2016070756A (ja) | 制御システム | |
CN109408720A (zh) | 基于电子锁屏幕的信息推荐方法、系统及介质 | |
JP2009104526A (ja) | 認証装置、認証方法及びプログラム | |
US20230009912A1 (en) | Region recommendation device | |
AU2022100065A4 (en) | Data integrity management in a computer network | |
WO2022208598A1 (fr) | Système et procédé d'authentification | |
JP2010170212A (ja) | 行動推定装置および方法 | |
JP2014119995A (ja) | 情報処理装置及び情報処理プログラム | |
KR101815468B1 (ko) | 스마트 문손잡이 커버 | |
WO2020246368A1 (fr) | Dispositif de reconnaissance faciale, procédé de reconnaissance faciale et support d'informations lisible par ordinateur |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006529007 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |